An approach to evaluate data trustworthiness based on data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Secure Data Management, 82-98, 2008 | 205 | 2008 |
TIAMAT: a tool for interactive analysis of microdata anonymization techniques C Dai, G Ghinita, E Bertino, JW Byun, N Li Proceedings of the VLDB Endowment 2 (2), 1618-1621, 2009 | 59 | 2009 |
The challenge of assuring data trustworthiness E Bertino, C Dai, M Kantarcioglu Database Systems for Advanced Applications, 22-33, 2009 | 28 | 2009 |
Assessing the trustworthiness of location data based on provenance C Dai, HS Lim, E Bertino, YS Moon Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances …, 2009 | 23 | 2009 |
High-assurance integrity techniques for databases E Bertino, C Dai, HS Lim, D Lin Sharing Data, Information and Knowledge, 244-256, 2008 | 18 | 2008 |
Trust evaluation of data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Computer, 2008 | 16 | 2008 |
Towards adaptive probabilistic search in unstructured P2P systems L Xu, C Dai, W Cai, S Zhou, A Zhou Advanced Web Technologies and Applications, 258-268, 2004 | 15 | 2004 |
Privacy-Preserving Assessment of Social Network Data Trustworthiness C Dai, FY Rao, TM Truta, E Bertino | 12* | |
Query processing techniques for compliance with data confidence policies C Dai, D Lin, M Kantarcioglu, E Bertino, E Celikel, B Thuraisingham Secure Data Management, 49-67, 2009 | 10 | 2009 |
A policy-based approach for assuring data integrity in DBMSs HS Lim, C Dai, E Bertino Collaborative Computing: Networking, Applications and Worksharing …, 2010 | 4 | 2010 |
Adaptive probabilistic search over unstructured peer-to-peer computing systems A Zhou, L Xu, C Dai World Wide Web 9 (4), 537-556, 2006 | 3 | 2006 |
Privacy-preserving assessment of location data trustworthiness C Dai, FY Rao, G Ghinita, E Bertino Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances …, 2011 | 1 | 2011 |
Database Security C Dai, G Ghinita, E Bertino, J Byun, N Li | | 2010 |